Picture this: your data science team wants to train a model against production data, but your security engineer is already sweating about AWS permissions. Everyone wants speed, no one wants a breach. That is exactly where Domino Data Lab IAM Roles step in.
In Domino, compute environments spin up dynamically across cloud resources. Each run needs the right identity to fetch data from S3, hit APIs, or write results to secured stores. Manually managing keys or long‑lived credentials is a nightmare. IAM Roles fix that by letting workloads assume scoped, temporary access that stays compliant and auditable. Combined, Domino and IAM form an identity fabric that is both invisible and enforced.
So how does it actually work? Domino maps project-level configuration to cloud IAM Roles that your platform or identity provider trusts. When a data scientist launches a job, Domino brokers the session using STS (Secure Token Service). The job inherits least-privilege access based on that assigned role, then automatically releases it once the compute cluster shuts down. No shared secrets, no overstuffed policies.
To get it right, start with clean boundaries.
- Create cloud IAM Roles per environment or team function rather than each user.
- Define permissions with explicit actions against known resource ARNs.
- Use OIDC integration to connect Domino with IdPs like Okta or Azure AD for federated trust.
- Rotate assumptions regularly and monitor CloudTrail to verify the lifespan of tokens.
If anything feels brittle, chances are the trust policy is too permissive. Keep everything as narrow as possible. The art is making it easy enough that engineers do not reach for access keys out of frustration.